A context-based detection framework for advanced persistent threats P Giura, W Wang 2012 International Conference on Cyber Security, 69-74, 2012 | 139 | 2012 |
Using large scale distributed computing to unveil advanced persistent threats P Giura, W Wang Science J 1 (3), 93-105, 2012 | 112 | 2012 |
Highly efficient techniques for network forensics M Ponec, P Giura, H Brönnimann, J Wein Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 52 | 2007 |
Mitigating sms spam by online detection of repetitive near-duplicate messages B Coskun, P Giura 2012 IEEE International Conference on Communications (ICC), 999-1004, 2012 | 41 | 2012 |
New payload attribution methods for network forensic investigations M Ponec, P Giura, J Wein, H Brönnimann ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-32, 2010 | 41 | 2010 |
Secure browsing via a transparent network proxy P Giura, JE Bickford, DE Hendrix, HF Shirokmann, TA Anschutz, CC Shih US Patent 9,537,885, 2017 | 34 | 2017 |
Netstore: An efficient storage infrastructure for network forensics and monitoring P Giura, N Memon International Workshop on Recent Advances in Intrusion Detection, 277-296, 2010 | 33 | 2010 |
Is it really you? User identification via adaptive behavior fingerprinting P Giura, I Murynets, R Piqueras Jover, Y Vahlis Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 24 | 2014 |
Enterprise server behavior profiling P Giura, S Nurilov, M Sankore, C Spielman US Patent 10,797,974, 2020 | 23 | 2020 |
Enterprise server behavior profiling P Giura, S Nurilov, M Sankore, C Spielman US Patent 10,367,704, 2019 | 23 | 2019 |
Blockchain solution for an automated advertising marketplace L Johnson, H Fischmann, C Serban, J Morovitz, P Giura US Patent 11,132,707, 2021 | 20 | 2021 |
Method and apparatus for ranking apps in the wide-open internet AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ... US Patent App. 13/540,249, 2014 | 19 | 2014 |
Methods of generating signatures from groups of electronic messages and related methods and systems for identifying spam messages P Giura, B Coskun US Patent 10,333,877, 2019 | 16 | 2019 |
How vulnerabilities in wireless networks can enable Advanced Persistent Threats RP Jover, P Giura International Journal on Information Technology (IREIT) 1 (2), 145-151, 2013 | 14 | 2013 |
Computation of historical data P Giura US Patent 10,129,212, 2018 | 9 | 2018 |
Safe internet browsing using a transparent virtual browser J Bickford, P Giura 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 9 | 2015 |
Method and apparatus for robust mobile application fingerprinting AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ... US Patent App. 13/540,307, 2014 | 9 | 2014 |
Verification service Q Shen, AG Forte, P Giura, M Istomin, E Vahlis, W Wang US Patent 8,739,247, 2014 | 8 | 2014 |
Methods, systems, and computer program products for protecting a communication network against internet enabled cyber attacks through use of screen replication from controlled … P Giura, JE Bickford, G De Los Reyes US Patent 9,258,324, 2016 | 7 | 2016 |
The security cost of content distribution network architectures P Giura, G De Los Reyes 2011 IEEE 35th Annual Computer Software and Applications Conference …, 2011 | 6 | 2011 |